共 22 条
[3]
[Anonymous], 2013, Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC '13, DOI [10.1145/2491266.2491270, DOI 10.1145/2491266.2491270]
[4]
[Anonymous], 1996, SECURE SCHEMES SECRE
[5]
[Anonymous], CCS07 P 14 ACM C
[6]
[Anonymous], 2012, P 7 ACM S INFORM COM
[7]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[8]
Cao Y, 2015, PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), P2, DOI 10.1109/NAS.2015.7255196
[9]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[10]
Dijiang Huang, 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P614, DOI 10.1109/INFCOMW.2011.5928886